Sciweavers

648 search results - page 119 / 130
» Lowness for Demuth Randomness
Sort
View
PKC
2005
Springer
167views Cryptology» more  PKC 2005»
14 years 3 months ago
Converse Results to the Wiener Attack on RSA
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-...
Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef...
PREMI
2005
Springer
14 years 3 months ago
Geometric Decision Rules for Instance-Based Learning Problems
In the typical nonparametric approach to classification in instance-based learning and data mining, random data (the training set of patterns) are collected and used to design a d...
Binay K. Bhattacharya, Kaustav Mukherjee, Godfried...
SIGMETRICS
2004
ACM
131views Hardware» more  SIGMETRICS 2004»
14 years 3 months ago
Failure recovery for structured P2P networks: protocol design and performance evaluation
Measurement studies indicate a high rate of node dynamics in p2p systems. In this paper, we address the question of how high a rate of node dynamics can be supported by structured...
Simon S. Lam, Huaiyu Liu
INFOCOM
2003
IEEE
14 years 3 months ago
A Framework for Reliable Routing in Mobile Ad Hoc Networks
— Mobile ad hoc networks consist of nodes that are often vulnerable to failure. As such, it is important to provide redundancy in terms of providing multiple nodedisjoint paths f...
Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K....
ISCAS
2003
IEEE
189views Hardware» more  ISCAS 2003»
14 years 3 months ago
Bio-inspired optical flow circuits for the visual guidance of micro air vehicles
In 1986, Franceschini et al. built an optronic velocity sensor [11], the principle of which was based on the findings they had recently made on fly EMDs by performing electrophysio...
Franck Ruffier, Stéphane Viollet, S. Amic, ...